Win32/NukeSped [Threat Name] go to Threat

Win32/NukeSped.H [Threat Variant Name]

Category trojan
Size 126976 B
Detection created May 22, 2017
Detection database version 15458
Aliases Win32:Malware-gen (Avast)
  SCGeneric_c.AIGE.trojan (AVG)
  TR/Agent.rhagj (Avira)
  Trojan.GenericKD.4837544 (BitDefender)
  RDN/Generic.com.trojan (McAfee)
  Trojan.Gen.2 (Symantec)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

The trojan does not create any copies of itself.

Information stealing

The trojan collects the following information:

  • information about the operating system and system settings
  • list of disk devices and their type
  • unique identifier of infected computer
  • number of milliseconds that have elapsed since the system was started
  • CPU information
  • MAC address
  • computer name
  • language settings

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (3) URLs. The TCP protocol is used in the communication.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • execute shell commands
  • terminate running processes
  • delete files
  • send requested files
  • set file attributes
  • create Registry entries
  • stop itself for a certain time period
  • send the list of disk devices and their type to a remote computer
  • send the list of files on a specific drive to a remote computer
  • send the list of running processes to a remote computer
  • capture screenshots
  • send gathered information

The trojan keeps various information in the following Registry key:

  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­WABE\­DataPath]

Please enable Javascript to ensure correct displaying of this content and refresh this page.